Information Technology
Security Analyst
Last updated
Security Analysts monitor organizational IT environments for threats, investigate security alerts and incidents, assess vulnerabilities, and implement controls that protect systems and data. They work within security operations centers (SOCs) or IT security teams, serving as the practitioners who translate security policies into daily defensive actions.
Role at a glance
- Typical education
- Bachelor's degree in cybersecurity, CS, or related field; Associate degree or bootcamp with experience also accepted
- Typical experience
- Entry-level to experienced (varies by tier)
- Key certifications
- CompTIA Security+, CompTIA CySA+, GIAC GCIA, CISSP
- Top employer types
- MSSPs, large corporations, cloud-native organizations, mid-size companies
- Growth outlook
- Significant growth projected by BLS through the early 2030s, outpacing supply
- AI impact (through 2030)
- Augmentation — AI-powered tools are automating routine alert triage, pushing the human analyst's focus toward more complex, high-value investigations.
Duties and responsibilities
- Monitor SIEM platforms, EDR systems, and security dashboards for alerts indicating potential security incidents or policy violations
- Investigate security alerts to determine severity and scope: collect evidence, analyze logs, and document findings with clear, actionable conclusions
- Respond to confirmed security incidents following established playbooks: contain threats, preserve evidence, and notify stakeholders according to escalation procedures
- Conduct regular vulnerability scans across internal and external infrastructure, analyze results, and track remediation completion by system owners
- Analyze phishing emails, suspicious URLs, and malicious attachments reported by employees; provide guidance and take protective action when threats are confirmed
- Review access logs and user behavior analytics for indicators of insider threat, compromised accounts, or unauthorized data access
- Maintain and update security incident response plans, playbooks, and standard operating procedures for common threat types
- Participate in threat intelligence review: assess vendor advisories, government alerts, and industry threat reports for relevance to the organization's environment
- Support security awareness training efforts by contributing to training content and conducting targeted education after incidents involving social engineering
- Produce security metrics and trend reports for IT management covering alert volume, incident response times, and vulnerability remediation rates
Overview
Security Analysts are the practitioners who execute an organization's cybersecurity defenses day-to-day. While security architects design the systems and security managers own the program strategy, analysts are the people who watch for threats in real time, investigate when something suspicious happens, and respond when something bad is confirmed.
The SOC environment defines the work for many security analysts. Every day brings a queue of security alerts from endpoint detection systems, firewalls, and identity protection tools — each one requiring enough investigation to determine whether it represents a real threat or a benign event that the detection system misclassified. Getting that determination right requires both technical knowledge and the pattern recognition that develops with experience. New analysts tend to spend more time on each alert; experienced analysts develop efficient workflows that let them triage accurately at speed.
Phishing investigations are a high-volume responsibility. The majority of security incidents begin with a phishing email, and analysts review reported phishing emails constantly — examining headers to trace origins, checking URLs and domains against threat intelligence, sandboxing attachments, and determining whether any users clicked before the email was reported. When someone did click, the investigation expands to the endpoint: was malware executed? Were credentials submitted? Did lateral movement occur?
Vulnerability management is the ongoing background work of security. Scanners run on schedule, producing reports of systems with unpatched vulnerabilities. The analyst's job is to prioritize those findings by severity and exploit status, assign remediation to the appropriate system owner, and track completion. A vulnerability that remains unpatched after a reasonable deadline despite notification represents a risk that escalates up the chain.
Incident response is the most high-stakes part of the role. When an investigation confirms an active compromise, the analyst follows the incident response playbook — isolating affected systems, preserving forensic evidence, notifying the incident response team and management, and documenting every action taken during containment and recovery. Well-executed incident response minimizes damage; poorly executed incident response allows breaches to expand.
Qualifications
Education:
- Bachelor's degree in cybersecurity, computer science, information systems, or a related field (standard at most employers)
- Associate degree with strong certification profile is accepted at many organizations, particularly at MSSPs and mid-size companies
- Cybersecurity bootcamp graduates with CompTIA Security+ and practical lab experience are increasingly competitive
Certifications:
- CompTIA Security+ — the standard entry credential; practical minimum for most analyst positions
- CompTIA CySA+ — analyst-focused next step; detection, analysis, and incident response emphasis
- GIAC GCIA or GCIH for organizations that value GIAC technical certification over CompTIA
- CISSP — senior analyst and management aspiration credential; requires 5 years of experience
- Cloud security: AWS Security Specialty, AZ-500 (Azure Security Engineer), or CCSP for cloud-focused roles
Technical skills:
- SIEM: Splunk, Microsoft Sentinel, IBM QRadar, or Elastic SIEM — query language, alert creation, dashboard construction
- EDR: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne — investigation workflows, process tree analysis
- Network security: Wireshark for packet capture analysis; firewall and proxy log interpretation
- Threat intelligence: MITRE ATT&CK framework knowledge; IOC lookup in VirusTotal, MISP, or commercial TI platforms
- Scripting: Python for automation; PowerShell for Windows investigation; Bash for Linux investigation
- Forensics basics: disk image analysis, memory analysis tools (Volatility), log correlation for incident timelines
Mindset and habits:
- Methodical investigation approach: working from hypothesis to evidence, not guessing
- Written precision: investigation notes and incident reports that can be read by anyone without additional context
- Continuous learning: security requires staying current with threat landscape evolution that no certification tracks
Career outlook
Information security analyst is one of the most consistently in-demand occupations in the US labor market. The BLS projects employment to grow significantly faster than average through the early 2030s, and the current unfilled security role counts suggest demand will continue to outpace supply for years.
The nature of the demand is shifting, though the overall level isn't. AI-powered security tools are handling more of the alert triage that previously occupied Tier 1 SOC analyst time. This is pushing the effective floor of human analyst work upward — the work that reaches analysts is genuinely harder, and analysts who can handle that work are more valuable than those who are optimized for high-volume simple triage.
Cloud security is the most dynamic growth area. As organizations move critical workloads to AWS, Azure, and GCP, the threat surface expands into environments that require cloud-specific analysis skills. Security analysts who understand cloud-native attack paths — misconfigured S3 buckets, over-permissive IAM roles, instance metadata service exploitation — are in higher demand than generalists who can only work in on-premises monitoring environments.
The managed security service provider (MSSP) sector continues to grow as small and medium-sized organizations outsource security operations. MSSP analyst roles offer broad exposure to multiple client environments — typically rotating across dozens of different organizations' security systems — which accelerates skill development but can also lead to lower pay and higher analytical volume than in-house corporate security positions.
For analysts targeting continued advancement, the paths branch toward Senior Analyst, Threat Intelligence Analyst, Incident Responder, Security Engineer, or Security Manager depending on skills and interests. The transition from analyst to engineer or architect requires building deeper technical skills alongside the operational foundation; the transition to management requires building people and program skills. Both paths are well-compensated and increasingly accessible to analysts who invest in their development.
Sample cover letter
Dear Hiring Manager,
I'm applying for the Security Analyst position at [Company]. I've been working as a Tier 1 SOC analyst at [Current MSSP] for two years, covering security operations for a portfolio of 40+ clients across financial services, healthcare, and professional services industries. I'm looking for an in-house role where I can develop deeper organizational context and advance toward Tier 2 investigation work.
The most valuable experience I've gotten at my current job is developing triage efficiency across diverse environments. Working across 40+ client SIEM instances means I've developed pattern recognition for what normal looks like in different industries — what authentication patterns are expected in a healthcare organization versus a manufacturing company, what scheduled task creation is benign versus suspicious in a financial services environment. That context has made me significantly faster and more accurate at distinguishing real threats from false positives.
The investigation I'm most proud of involved a client whose EDR generated a low-severity alert for a PowerShell execution with an unusual encoding pattern. The alert would normally be closed after verifying the user and process, but something about the timing and source IP made me dig further. I found that the encoded command was downloading a second-stage payload from a domain registered three days earlier. I escalated to our Tier 2 team and we confirmed a targeted attack on a finance team employee — the threat actor had been in the environment for six hours before the initial alert fired. The client's IR team contained it within four hours of our escalation.
I hold CompTIA Security+ and CySA+ certifications. I'm studying for GCIA and currently working through Splunk's Core Certified User material.
I'd welcome the opportunity to discuss this role.
[Your Name]
Frequently asked questions
- What is the difference between a Security Analyst and an Information Security Analyst?
- The titles are used interchangeably at most organizations. 'Information Security Analyst' is the formal Bureau of Labor Statistics occupational title, and it's used in job postings and compensation surveys. 'Security Analyst' is more commonly used in day-to-day practice. Both refer to the role of monitoring, investigating, and defending organizational IT environments from security threats.
- What certifications do Security Analysts need?
- CompTIA Security+ is the baseline credential expected at most organizations. CompTIA CySA+ builds on it with more analytical and detection-focused content. For more advanced positions, GIAC certifications (GCIA, GCIH) provide recognized technical depth. CISSP is the senior credential for analysts targeting senior analyst or management roles. Cloud-focused Security Analysts should pursue AWS Security Specialty, Azure Security Engineer (AZ-500), or CCSP as cloud workloads expand their scope of coverage.
- What does Tier 1 versus Tier 2 SOC analyst mean?
- SOC tiers reflect escalation structure. Tier 1 analysts perform initial triage — reviewing alert queues, applying documented playbooks to common threat patterns, and escalating to Tier 2 what they cannot resolve. Tier 2 analysts handle escalated alerts that require deeper investigation, more complex malware analysis, and correlation across multiple data sources. Senior analysts operate at Tier 3, handling the most complex investigations and threat hunting. The 'Security Analyst' title appears at all tiers depending on the organization.
- How much scripting or coding does a Security Analyst need?
- Basic scripting fluency is increasingly expected and practically valuable at the analyst level. Python for log parsing, threat intelligence lookups, and investigation automation; PowerShell for Windows-environment investigations; and regex for SIEM query construction are the most common. Full software development expertise is not required, but analysts who can write functional scripts work significantly faster than those who can't.
- How is AI changing the Security Analyst role?
- AI-powered SIEM and EDR platforms are doing more initial triage automatically — correlating related events, scoring alerts by risk, and reducing the volume of false positives reaching human analysts. This compresses the volume of simple alerts while concentrating human analyst time on complex investigations that AI cannot resolve. Additionally, AI tools used by attackers — AI-generated phishing, AI-accelerated vulnerability discovery — are increasing the sophistication of threats that analysts must detect and respond to.
More in Information Technology
See all Information Technology jobs →- SAP Technical Consultant$105K–$165K
SAP Technical Consultants design, develop, and configure the technical components of SAP ERP systems — writing ABAP programs, building integrations, managing Basis infrastructure, and supporting SAP application performance. They translate functional requirements into technical implementations and serve as the technical authority on SAP platforms for consulting firms and in-house enterprise IT teams.
- Security Engineer Assistant$50K–$80K
Security Engineer Assistants support senior security engineers and analysts in operating and maintaining an organization's security infrastructure. They monitor security alerts, assist with tool configuration, help respond to incidents under supervision, and develop the technical skills and security knowledge that lead to full security engineer or analyst roles.
- SAP Supply Chain Consultant$95K–$155K
SAP Supply Chain Consultants design, configure, and implement SAP modules that manage procurement, inventory, production planning, and logistics for large enterprises. They translate business requirements into system configurations, lead user training, and ensure supply chain processes operate correctly in SAP environments ranging from ECC 6.0 to S/4HANA.
- Senior Information Security Analyst$105K–$155K
Senior Information Security Analysts protect organizations from cyber threats by monitoring security systems, investigating incidents, assessing vulnerabilities, and driving security improvements across the technology environment. They lead security operations activities, mentor junior analysts, contribute to security architecture decisions, and serve as the technical escalation point for complex security incidents and risk assessments.
- DevOps IT Service Management (ITSM) Engineer$95K–$140K
DevOps ITSM Engineers bridge traditional IT Service Management practices and modern DevOps delivery — designing and operating the change management, incident management, and service request workflows that govern how IT changes move through organizations while remaining compatible with high-frequency deployment pipelines. They configure, automate, and optimize ITSM platforms to support rapid delivery without sacrificing auditability.
- IT Compliance Manager$95K–$155K
IT Compliance Managers own the design, implementation, and continuous monitoring of an organization's technology compliance programs — ensuring IT systems, processes, and controls satisfy regulatory requirements, contractual obligations, and internal policy. They sit at the intersection of IT operations, legal, risk management, and audit, translating framework requirements like SOC 2, ISO 27001, PCI DSS, and HIPAA into actionable controls and evidence packages that hold up under external scrutiny.